From the course: Cybersecurity Awareness: Phishing Attacks
Unlock the full course today
Join today to access over 23,200 courses taught by industry experts.
Other notable methods of phishing
From the course: Cybersecurity Awareness: Phishing Attacks
Other notable methods of phishing
- [Narrator] At this point, I've talked about being phished by email, phone, social media, and text message. There are so many ways to phish a person, and they won't all fit into this course. But before we move on, I want to highlight some other phishing methods that you may come across in the future. In traditional fishing, you'd use a lure as bait. It works the same way in the type of phishing we discuss in this course, but there are some phishing attacks that do not require the use of a lure. An example of this is pharming. Pharming doesn't require a lure because you've either already been susceptible to the lure by this point or this was done without any involvement from you at all. Pharming occurs when malicious code that causes people to be redirected to a malicious website is installed on a computer or a server. Sometimes pharming is done by a change made to the host file on a computer. Host files exist for a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.